EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 3

Predicting VoLTE Quality using Random Neural Network

journal image
 Download
335
  • Manish M Potey and C. A. Dhote and Deepak Sharma 2016. Predicting VoLTE Quality using Random Neural Network. IJAIS Proceedings on International Conference on Communication Computing and Virtualization. ICCCV 2016, 2 (July 2016), 29-32. DOI=http://dx.doi.org/10.5120/ijais451392
  • @article{10.5120/ijais2017451568,
    author = {Manish M Potey and C. A. Dhote and Deepak Sharma},
    title = {Predicting VoLTE Quality using Random Neural Network},
    journal = {IJAIS Proceedings on International Conference on Communication Computing and Virtualization},
    issue_date = {July 2016},
    volume = {ICCCV 2016},
    number = {},
    month = {July},
    year = {2016},
    issn = {},
    pages = {29-32},
    numpages = {},
    url = {/archives/volumeICCCV 2016/number2/923-923-2016451587},
    doi = { 10.5120/icccv201666},
    publisher = { © 2015 by IJAIS Journal},
    address = {}
    }
    
  • %1 451392
    %A Manish M Potey
    %A C.  A.  Dhote
    %A Deepak Sharma
    %T Predicting VoLTE Quality using Random Neural Network
    %J IJAIS Proceedings on International Conference on Communication Computing and Virtualization
    %@ 
    %V ICCCV 2016
    %N 
    %P 29-32
    %D 2016
    %I  © 2015 by IJAIS Journal
    

Abstract

In managed security model the focus is on security provided as cloud service; i. e. security delivered through the cloud instead of on-premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and granting correct level of access for resources which are protected in the cloud environment. The IAM implemented as managed cloud service can benefit the user with all the advantages offered by Security-as-a-service model (SECaaS). This paper discusses implementation of a proof-of-concept (POC) of transparent managed IAM service. This prototype has been also evaluated. The relevant technologies are discussed for providing secure access to cloud users.

References

    Keywords

    Voice quality, VoLTE, MOS, WB-PESQ, RNN

    Index Terms

    Computer Science
    Information Sciences